Loading...

On the security of an ECC based RFID authentication protocol

Babaheidarian, P ; Sharif University of Technology | 2012

634 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISCISC.2012.6408200
  3. Publisher: 2012
  4. Abstract:
  5. Following the fact that there are some efficient implementations of ECC-based RFID authentication protocols on RFID tags, a new family of RFID authentication protocols known as EC-RAC family has been introduced. However, it has been shown that all the versions of EC-RAC protocols are exposed to privacy and/or security threats. In this paper we analyzed a version of the EC-RAC RFID authentication protocol as well as a version of Schnorr protocol which were presented in a recent work and are claimed to have the demanding requirements. We demonstrated an impersonation attack on the claimed improved EC-RAC, and consequently showed that it would not satisfy the tag authentication property. Also, we showed that the improved Schnorr protocol does not provide the untraceability feature. Moreover, we discussed the inherent problems of the claimed protocols and why they fail
  6. Keywords:
  7. Authentication protocol ; Elliptic curve randomized access control ; RFID ; Traceability ; Authentication protocols ; Efficient implementation ; Elliptic curve ; Exposed to ; Impersonation attack ; RF-ID tags ; Rfid authentication protocols ; Security threats ; Un traceabilitys ; Authentication ; Cryptography ; Security of data ; Radio frequency identification (RFID)
  8. Source: 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012 ; 2012 , Pages 111-114 ; 9781467323864 (ISBN)
  9. URL: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6408200